Report error if any disable action fails
[lttng-tools.git] / src / bin / lttng-sessiond / event.c
CommitLineData
54d01ffb
DG
1/*
2 * Copyright (C) 2011 - David Goulet <david.goulet@polymtl.ca>
3 *
d14d33bf
AM
4 * This program is free software; you can redistribute it and/or modify
5 * it under the terms of the GNU General Public License, version 2 only,
6 * as published by the Free Software Foundation.
54d01ffb 7 *
d14d33bf
AM
8 * This program is distributed in the hope that it will be useful,
9 * but WITHOUT ANY WARRANTY; without even the implied warranty of
10 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
11 * GNU General Public License for more details.
54d01ffb 12 *
d14d33bf
AM
13 * You should have received a copy of the GNU General Public License along
14 * with this program; if not, write to the Free Software Foundation, Inc.,
15 * 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
54d01ffb
DG
16 */
17
be040666 18#define _GNU_SOURCE
6c1c0768 19#define _LGPL_SOURCE
d87bfb32 20#include <errno.h>
54d01ffb 21#include <urcu/list.h>
2bdd86d4 22#include <string.h>
54d01ffb
DG
23
24#include <lttng/lttng.h>
db758600 25#include <common/error.h>
10a8a223 26#include <common/sessiond-comm/sessiond-comm.h>
54d01ffb
DG
27
28#include "channel.h"
29#include "event.h"
4771f025 30#include "kernel.h"
be6a6276 31#include "lttng-sessiond.h"
9df8df5e 32#include "ust-ctl.h"
edb67388
DG
33#include "ust-app.h"
34#include "trace-kernel.h"
35#include "trace-ust.h"
7c1d2758 36#include "agent.h"
54d01ffb 37
025faf73
DG
38/*
39 * Add unique UST event based on the event name, filter bytecode and loglevel.
40 */
18eace3b
DG
41static void add_unique_ust_event(struct lttng_ht *ht,
42 struct ltt_ust_event *event)
43{
44 struct cds_lfht_node *node_ptr;
45 struct ltt_ust_ht_key key;
46
47 assert(ht);
48 assert(ht->ht);
49 assert(event);
50
51 key.name = event->attr.name;
52 key.filter = (struct lttng_filter_bytecode *) event->filter;
b953b8cd
PP
53 key.loglevel_type = event->attr.loglevel_type;
54 key.loglevel_value = event->attr.loglevel;
4031e53e 55 key.exclusion = event->exclusion;
18eace3b
DG
56
57 node_ptr = cds_lfht_add_unique(ht->ht,
58 ht->hash_fct(event->node.key, lttng_ht_seed),
59 trace_ust_ht_match_event, &key, &event->node.node);
60 assert(node_ptr == &event->node.node);
61}
62
54d01ffb 63/*
7a3d1328 64 * Disable kernel tracepoint event for a channel from the kernel session.
54d01ffb 65 */
d0ae4ea8 66int event_kernel_disable_event(struct ltt_kernel_channel *kchan,
d3a56674 67 char *event_name)
54d01ffb
DG
68{
69 int ret;
70 struct ltt_kernel_event *kevent;
71
0525e9ae
DG
72 assert(kchan);
73
d0ae4ea8
MD
74 kevent = trace_kernel_get_event_by_name(event_name, kchan,
75 LTTNG_EVENT_ALL);
54d01ffb 76 if (kevent == NULL) {
f73fabfd 77 ret = LTTNG_ERR_NO_EVENT;
54d01ffb
DG
78 goto error;
79 }
80
81 ret = kernel_disable_event(kevent);
82 if (ret < 0) {
f73fabfd 83 ret = LTTNG_ERR_KERN_DISABLE_FAIL;
54d01ffb
DG
84 goto error;
85 }
86
87 DBG("Kernel event %s disable for channel %s.",
88 kevent->event->name, kchan->channel->name);
89
f73fabfd 90 ret = LTTNG_OK;
54d01ffb
DG
91
92error:
93 return ret;
94}
95
96/*
7a3d1328 97 * Disable kernel tracepoint events for a channel from the kernel session.
54d01ffb 98 */
d0ae4ea8
MD
99int event_kernel_disable_event_type(struct ltt_kernel_channel *kchan,
100 enum lttng_event_type type)
54d01ffb
DG
101{
102 int ret;
103 struct ltt_kernel_event *kevent;
104
0525e9ae
DG
105 assert(kchan);
106
54d01ffb
DG
107 /* For each event in the kernel session */
108 cds_list_for_each_entry(kevent, &kchan->events_list.head, list) {
d0ae4ea8
MD
109 if (type != LTTNG_EVENT_ALL && kevent->type != type)
110 continue;
54d01ffb
DG
111 ret = kernel_disable_event(kevent);
112 if (ret < 0) {
113 /* We continue disabling the rest */
114 continue;
115 }
116 }
f73fabfd 117 ret = LTTNG_OK;
7a3d1328
MD
118 return ret;
119}
120
7a3d1328
MD
121/*
122 * Disable all kernel event for a channel from the kernel session.
123 */
d0ae4ea8 124int event_kernel_disable_event_all(struct ltt_kernel_channel *kchan)
7a3d1328 125{
d0ae4ea8 126 return event_kernel_disable_event_type(kchan, LTTNG_EVENT_ALL);
54d01ffb
DG
127}
128
129/*
7a3d1328 130 * Enable kernel tracepoint event for a channel from the kernel session.
49d21f93 131 * We own filter_expression and filter.
54d01ffb 132 */
d0ae4ea8 133int event_kernel_enable_event(struct ltt_kernel_channel *kchan,
00a62084
MD
134 struct lttng_event *event, char *filter_expression,
135 struct lttng_filter_bytecode *filter)
54d01ffb
DG
136{
137 int ret;
138 struct ltt_kernel_event *kevent;
139
0525e9ae
DG
140 assert(kchan);
141 assert(event);
142
00a62084
MD
143 kevent = trace_kernel_find_event(event->name, kchan,
144 event->type, filter);
54d01ffb 145 if (kevent == NULL) {
00a62084
MD
146 ret = kernel_create_event(event, kchan,
147 filter_expression, filter);
a969e101
MD
148 /* We have passed ownership */
149 filter_expression = NULL;
150 filter = NULL;
54d01ffb 151 if (ret < 0) {
bd29c13d
DG
152 switch (-ret) {
153 case EEXIST:
f73fabfd 154 ret = LTTNG_ERR_KERN_EVENT_EXIST;
bd29c13d
DG
155 break;
156 case ENOSYS:
f73fabfd 157 ret = LTTNG_ERR_KERN_EVENT_ENOSYS;
bd29c13d
DG
158 break;
159 default:
f73fabfd 160 ret = LTTNG_ERR_KERN_ENABLE_FAIL;
bd29c13d 161 break;
d87bfb32 162 }
7a3d1328 163 goto end;
54d01ffb
DG
164 }
165 } else if (kevent->enabled == 0) {
166 ret = kernel_enable_event(kevent);
167 if (ret < 0) {
f73fabfd 168 ret = LTTNG_ERR_KERN_ENABLE_FAIL;
7a3d1328 169 goto end;
54d01ffb 170 }
42224349
DG
171 } else {
172 /* At this point, the event is considered enabled */
f73fabfd 173 ret = LTTNG_ERR_KERN_EVENT_EXIST;
42224349 174 goto end;
54d01ffb 175 }
42224349 176
f73fabfd 177 ret = LTTNG_OK;
7a3d1328 178end:
a969e101
MD
179 free(filter_expression);
180 free(filter);
54d01ffb
DG
181 return ret;
182}
183
7f79d3a1
DG
184/*
185 * ============================
186 * UST : The Ultimate Frontier!
187 * ============================
188 */
189
2bdd86d4
MD
190/*
191 * Enable UST tracepoint event for a channel from a UST session.
49d21f93 192 * We own filter_expression, filter, and exclusion.
2bdd86d4 193 */
7972aab2 194int event_ust_enable_tracepoint(struct ltt_ust_session *usess,
025faf73 195 struct ltt_ust_channel *uchan, struct lttng_event *event,
6b453b5e 196 char *filter_expression,
f1613f52 197 struct lttng_filter_bytecode *filter,
88f06f15
JG
198 struct lttng_event_exclusion *exclusion,
199 bool internal_event)
2bdd86d4 200{
f73fabfd 201 int ret = LTTNG_OK, to_create = 0;
edb67388
DG
202 struct ltt_ust_event *uevent;
203
0525e9ae
DG
204 assert(usess);
205 assert(uchan);
206 assert(event);
207
18eace3b
DG
208 rcu_read_lock();
209
025faf73 210 uevent = trace_ust_find_event(uchan->events, event->name, filter,
b953b8cd 211 event->loglevel_type, event->loglevel, exclusion);
87c6e328 212 if (!uevent) {
6b453b5e 213 uevent = trace_ust_create_event(event, filter_expression,
87c6e328 214 filter, exclusion, internal_event);
49d21f93
MD
215 /* We have passed ownership */
216 filter_expression = NULL;
217 filter = NULL;
218 exclusion = NULL;
edb67388 219 if (uevent == NULL) {
95a82664 220 ret = LTTNG_ERR_UST_ENABLE_FAIL;
edb67388
DG
221 goto error;
222 }
025faf73 223
fc34caaa 224 /* Valid to set it after the goto error since uevent is still NULL */
edb67388
DG
225 to_create = 1;
226 }
2bdd86d4 227
7f79d3a1
DG
228 if (uevent->enabled) {
229 /* It's already enabled so everything is OK */
5bcdda4f 230 ret = LTTNG_ERR_UST_EVENT_ENABLED;
7f79d3a1
DG
231 goto end;
232 }
233
fc34caaa
DG
234 uevent->enabled = 1;
235
7972aab2
DG
236 if (to_create) {
237 /* Create event on all UST registered apps for session */
238 ret = ust_app_create_event_glb(usess, uchan, uevent);
239 } else {
240 /* Enable event on all UST registered apps for session */
241 ret = ust_app_enable_event_glb(usess, uchan, uevent);
242 }
48842b30 243
7972aab2
DG
244 if (ret < 0) {
245 if (ret == -LTTNG_UST_ERR_EXIST) {
246 ret = LTTNG_ERR_UST_EVENT_EXIST;
247 goto end;
248 } else {
249 ret = LTTNG_ERR_UST_ENABLE_FAIL;
250 goto error;
edb67388 251 }
2bdd86d4 252 }
48842b30 253
7f79d3a1 254 if (to_create) {
fc34caaa 255 /* Add ltt ust event to channel */
18eace3b 256 add_unique_ust_event(uchan->events, uevent);
7f79d3a1 257 }
edb67388 258
7f79d3a1
DG
259 DBG("Event UST %s %s in channel %s", uevent->attr.name,
260 to_create ? "created" : "enabled", uchan->name);
261
f73fabfd 262 ret = LTTNG_OK;
fc34caaa 263
fb89d070 264end:
18eace3b 265 rcu_read_unlock();
49d21f93
MD
266 free(filter_expression);
267 free(filter);
268 free(exclusion);
fc34caaa 269 return ret;
edb67388
DG
270
271error:
fc34caaa
DG
272 /*
273 * Only destroy event on creation time (not enabling time) because if the
274 * event is found in the channel (to_create == 0), it means that at some
275 * point the enable_event worked and it's thus valid to keep it alive.
276 * Destroying it also implies that we also destroy it's shadow copy to sync
277 * everyone up.
278 */
279 if (to_create) {
280 /* In this code path, the uevent was not added to the hash table */
281 trace_ust_destroy_event(uevent);
282 }
18eace3b 283 rcu_read_unlock();
49d21f93
MD
284 free(filter_expression);
285 free(filter);
286 free(exclusion);
2bdd86d4
MD
287 return ret;
288}
289
7f79d3a1
DG
290/*
291 * Disable UST tracepoint of a channel from a UST session.
292 */
7972aab2 293int event_ust_disable_tracepoint(struct ltt_ust_session *usess,
7f79d3a1 294 struct ltt_ust_channel *uchan, char *event_name)
2bdd86d4
MD
295{
296 int ret;
7f79d3a1 297 struct ltt_ust_event *uevent;
18eace3b
DG
298 struct lttng_ht_node_str *node;
299 struct lttng_ht_iter iter;
18eace3b 300 struct lttng_ht *ht;
2bdd86d4 301
0525e9ae
DG
302 assert(usess);
303 assert(uchan);
304 assert(event_name);
305
18eace3b
DG
306 ht = uchan->events;
307
18eace3b 308 rcu_read_lock();
025faf73
DG
309
310 /*
311 * We use a custom lookup since we need the iterator for the next_duplicate
312 * call in the do while loop below.
313 */
314 cds_lfht_lookup(ht->ht, ht->hash_fct((void *) event_name, lttng_ht_seed),
315 trace_ust_ht_match_event_by_name, event_name, &iter.iter);
18eace3b
DG
316 node = lttng_ht_iter_get_node_str(&iter);
317 if (node == NULL) {
318 DBG2("Trace UST event NOT found by name %s", event_name);
f73fabfd 319 ret = LTTNG_ERR_UST_EVENT_NOT_FOUND;
7f79d3a1 320 goto error;
2bdd86d4 321 }
7f79d3a1 322
18eace3b
DG
323 do {
324 uevent = caa_container_of(node, struct ltt_ust_event, node);
025faf73
DG
325 assert(uevent);
326
18eace3b
DG
327 if (uevent->enabled == 0) {
328 /* It's already disabled so everything is OK */
a1dcaf0f 329 goto next;
7f79d3a1 330 }
18eace3b 331
7972aab2
DG
332 ret = ust_app_disable_event_glb(usess, uchan, uevent);
333 if (ret < 0 && ret != -LTTNG_UST_ERR_EXIST) {
334 ret = LTTNG_ERR_UST_DISABLE_FAIL;
18eace3b
DG
335 goto error;
336 }
18eace3b
DG
337 uevent->enabled = 0;
338
025faf73
DG
339 DBG2("Event UST %s disabled in channel %s", uevent->attr.name,
340 uchan->name);
341
a1dcaf0f 342next:
18eace3b
DG
343 /* Get next duplicate event by name. */
344 cds_lfht_next_duplicate(ht->ht, trace_ust_ht_match_event_by_name,
345 event_name, &iter.iter);
346 node = lttng_ht_iter_get_node_str(&iter);
347 } while (node);
7f79d3a1 348
f73fabfd 349 ret = LTTNG_OK;
7f79d3a1 350
7f79d3a1 351error:
18eace3b 352 rcu_read_unlock();
7f79d3a1
DG
353 return ret;
354}
355
b1e7fe2d
JR
356/*
357 * Disable all UST tracepoints for a channel from a UST session.
358 */
359int event_ust_disable_all_tracepoints(struct ltt_ust_session *usess,
360 struct ltt_ust_channel *uchan)
361{
3e81c0f2 362 int ret, i, size, error = 0;
b1e7fe2d
JR
363 struct lttng_ht_iter iter;
364 struct ltt_ust_event *uevent = NULL;
365 struct lttng_event *events = NULL;
366
367 assert(usess);
368 assert(uchan);
369
370 rcu_read_lock();
371
372 /* Disabling existing events */
373 cds_lfht_for_each_entry(uchan->events->ht, &iter.iter, uevent,
374 node.node) {
375 if (uevent->enabled == 1) {
376 ret = event_ust_disable_tracepoint(usess, uchan,
377 uevent->attr.name);
378 if (ret < 0) {
3e81c0f2 379 error = LTTNG_ERR_UST_DISABLE_FAIL;
b1e7fe2d
JR
380 continue;
381 }
382 }
383 }
384
385 /* Get all UST available events */
386 size = ust_app_list_events(&events);
387 if (size < 0) {
388 ret = LTTNG_ERR_UST_LIST_FAIL;
389 goto error;
390 }
391
392 for (i = 0; i < size; i++) {
393 ret = event_ust_disable_tracepoint(usess, uchan,
394 events[i].name);
3e81c0f2 395 if (ret < 0) {
b1e7fe2d 396 /* Continue to disable the rest... */
3e81c0f2 397 error = LTTNG_ERR_UST_DISABLE_FAIL;
b1e7fe2d
JR
398 continue;
399 }
400 }
401
3e81c0f2 402 ret = error ? error : LTTNG_OK;
b1e7fe2d
JR
403error:
404 rcu_read_unlock();
405 free(events);
406 return ret;
407}
408
f20baf8e 409/*
022d91ba 410 * Enable all agent event for a given UST session.
f20baf8e
DG
411 *
412 * Return LTTNG_OK on success or else a LTTNG_ERR* code.
413 */
022d91ba 414int event_agent_enable_all(struct ltt_ust_session *usess,
fefd409b 415 struct agent *agt, struct lttng_event *event,
51755dc8 416 struct lttng_filter_bytecode *filter ,char *filter_expression)
f20baf8e
DG
417{
418 int ret;
fefd409b 419 struct agent_event *aevent;
f20baf8e
DG
420 struct lttng_ht_iter iter;
421
422 assert(usess);
423
022d91ba 424 DBG("Event agent enabling ALL events for session %" PRIu64, usess->id);
f20baf8e 425
022d91ba 426 /* Enable event on agent application through TCP socket. */
8404118c 427 ret = event_agent_enable(usess, agt, event, filter, filter_expression);
f20baf8e
DG
428 if (ret != LTTNG_OK) {
429 goto error;
430 }
431
432 /* Flag every event that they are now enabled. */
433 rcu_read_lock();
fefd409b 434 cds_lfht_for_each_entry(agt->events->ht, &iter.iter, aevent,
f20baf8e 435 node.node) {
fefd409b 436 aevent->enabled = 1;
f20baf8e
DG
437 }
438 rcu_read_unlock();
439
440 ret = LTTNG_OK;
441
442error:
443 return ret;
444}
445
446/*
022d91ba 447 * Enable a single agent event for a given UST session.
f20baf8e
DG
448 *
449 * Return LTTNG_OK on success or else a LTTNG_ERR* code.
450 */
fefd409b
DG
451int event_agent_enable(struct ltt_ust_session *usess,
452 struct agent *agt, struct lttng_event *event,
8404118c
JG
453 struct lttng_filter_bytecode *filter,
454 char *filter_expression)
f20baf8e
DG
455{
456 int ret, created = 0;
fefd409b 457 struct agent_event *aevent;
f20baf8e
DG
458
459 assert(usess);
460 assert(event);
fefd409b 461 assert(agt);
f20baf8e 462
022d91ba 463 DBG("Event agent enabling %s for session %" PRIu64 " with loglevel type %d "
51755dc8
JG
464 ", loglevel %d and filter \"%s\"", event->name,
465 usess->id, event->loglevel_type, event->loglevel,
466 filter_expression ? filter_expression : "NULL");
f20baf8e 467
a9319624
PP
468 aevent = agent_find_event(event->name, event->loglevel_type,
469 event->loglevel, agt);
fefd409b 470 if (!aevent) {
a9319624
PP
471 aevent = agent_create_event(event->name, event->loglevel_type,
472 event->loglevel, filter,
51755dc8 473 filter_expression);
fefd409b 474 if (!aevent) {
f20baf8e
DG
475 ret = LTTNG_ERR_NOMEM;
476 goto error;
477 }
478 created = 1;
479 }
480
481 /* Already enabled? */
fefd409b 482 if (aevent->enabled) {
f20baf8e
DG
483 goto end;
484 }
485
fefd409b 486 ret = agent_enable_event(aevent, agt->domain);
f20baf8e
DG
487 if (ret != LTTNG_OK) {
488 goto error;
489 }
490
491 /* If the event was created prior to the enable, add it to the domain. */
492 if (created) {
fefd409b 493 agent_add_event(aevent, agt);
f20baf8e
DG
494 }
495
496end:
497 return LTTNG_OK;
498
499error:
500 if (created) {
fefd409b 501 agent_destroy_event(aevent);
f20baf8e
DG
502 }
503 return ret;
504}
505
da6c3a50 506/*
d1ec8e20
JG
507 * Return the default event name associated with the provided UST domain. Return
508 * NULL on error.
da6c3a50
DG
509 */
510const char *event_get_default_agent_ust_name(enum lttng_domain_type domain)
511{
512 const char *default_event_name = NULL;
513
0e115563
DG
514 switch (domain) {
515 case LTTNG_DOMAIN_LOG4J:
d1ec8e20 516 default_event_name = DEFAULT_LOG4J_EVENT_NAME;
0e115563
DG
517 break;
518 case LTTNG_DOMAIN_JUL:
d1ec8e20 519 default_event_name = DEFAULT_JUL_EVENT_NAME;
0e115563
DG
520 break;
521 case LTTNG_DOMAIN_PYTHON:
e7c82272 522 default_event_name = DEFAULT_PYTHON_EVENT_NAME;
0e115563
DG
523 break;
524 default:
da6c3a50
DG
525 assert(0);
526 }
527
528 return default_event_name;
529}
530
f20baf8e 531/*
e261a6cc 532 * Disable a given agent event for a given UST session.
f20baf8e 533 *
e261a6cc 534 * Must be called with the RCU read lock held.
f20baf8e
DG
535 * Return LTTNG_OK on success or else a LTTNG_ERR* code.
536 */
e261a6cc
PP
537static int event_agent_disable_one(struct ltt_ust_session *usess,
538 struct agent *agt, struct agent_event *aevent)
f20baf8e
DG
539{
540 int ret;
be6a6276
DG
541 struct ltt_ust_event *uevent = NULL;
542 struct ltt_ust_channel *uchan = NULL;
71aecbf8 543 const char *ust_event_name, *ust_channel_name;
f20baf8e 544
fefd409b 545 assert(agt);
f20baf8e 546 assert(usess);
e261a6cc 547 assert(aevent);
f20baf8e 548
e261a6cc
PP
549 DBG("Event agent disabling %s (loglevel type %d, loglevel value %d) for session %" PRIu64,
550 aevent->name, aevent->loglevel_type, aevent->loglevel_value,
551 usess->id);
f20baf8e
DG
552
553 /* Already disabled? */
fefd409b 554 if (!aevent->enabled) {
f20baf8e
DG
555 goto end;
556 }
557
71aecbf8
DG
558 if (agt->domain == LTTNG_DOMAIN_JUL) {
559 ust_channel_name = DEFAULT_JUL_CHANNEL_NAME;
560 } else if (agt->domain == LTTNG_DOMAIN_LOG4J) {
561 ust_channel_name = DEFAULT_LOG4J_CHANNEL_NAME;
0e115563
DG
562 } else if (agt->domain == LTTNG_DOMAIN_PYTHON) {
563 ust_channel_name = DEFAULT_PYTHON_CHANNEL_NAME;
71aecbf8
DG
564 } else {
565 ret = LTTNG_ERR_INVALID;
566 goto error;
567 }
568
be6a6276
DG
569 /*
570 * Disable it on the UST side. First get the channel reference then find
571 * the event and finally disable it.
572 */
573 uchan = trace_ust_find_channel_by_name(usess->domain_global.channels,
71aecbf8 574 (char *) ust_channel_name);
be6a6276
DG
575 if (!uchan) {
576 ret = LTTNG_ERR_UST_CHAN_NOT_FOUND;
577 goto error;
578 }
579
da6c3a50
DG
580 ust_event_name = event_get_default_agent_ust_name(agt->domain);
581 if (!ust_event_name) {
582 ret = LTTNG_ERR_FATAL;
583 goto error;
be6a6276
DG
584 }
585
586 /*
b953b8cd
PP
587 * Agent UST event has its loglevel type forced to
588 * LTTNG_UST_LOGLEVEL_ALL. The actual loglevel type/value filtering
589 * happens thanks to an UST filter. The following -1 is actually
590 * ignored since the type is LTTNG_UST_LOGLEVEL_ALL.
be6a6276 591 */
da6c3a50 592 uevent = trace_ust_find_event(uchan->events, (char *) ust_event_name,
b953b8cd 593 aevent->filter, LTTNG_UST_LOGLEVEL_ALL, -1, NULL);
022d91ba 594 /* If the agent event exists, it must be available on the UST side. */
be6a6276
DG
595 assert(uevent);
596
597 ret = ust_app_disable_event_glb(usess, uchan, uevent);
598 if (ret < 0 && ret != -LTTNG_UST_ERR_EXIST) {
599 ret = LTTNG_ERR_UST_DISABLE_FAIL;
600 goto error;
601 }
602
0dcfcf94
DG
603 /*
604 * Flag event that it's disabled so the shadow copy on the ust app side
605 * will disable it if an application shows up.
606 */
607 uevent->enabled = 0;
608
fefd409b 609 ret = agent_disable_event(aevent, agt->domain);
f20baf8e
DG
610 if (ret != LTTNG_OK) {
611 goto error;
612 }
613
614end:
615 return LTTNG_OK;
616
617error:
618 return ret;
619}
e261a6cc
PP
620
621/*
622 * Disable all agent events matching a given name for a given UST session.
623 *
624 * Return LTTNG_OK on success or else a LTTNG_ERR* code.
625 */
626int event_agent_disable(struct ltt_ust_session *usess, struct agent *agt,
627 char *event_name)
628{
629 int ret = LTTNG_OK;
630 struct agent_event *aevent;
631 struct lttng_ht_iter iter;
632 struct lttng_ht_node_str *node;
633
634 assert(agt);
635 assert(usess);
636 assert(event_name);
637
638 DBG("Event agent disabling %s (all loglevels) for session %" PRIu64, event_name, usess->id);
639
640 rcu_read_lock();
641 agent_find_events_by_name(event_name, agt, &iter);
642 node = lttng_ht_iter_get_node_str(&iter);
643
644 if (node == NULL) {
645 DBG2("Event agent NOT found by name %s", event_name);
646 ret = LTTNG_ERR_UST_EVENT_NOT_FOUND;
647 goto end;
648 }
649
650 do {
651 aevent = caa_container_of(node, struct agent_event, node);
652 ret = event_agent_disable_one(usess, agt, aevent);
653
654 if (ret != LTTNG_OK) {
655 goto end;
656 }
657
658 /* Get next duplicate agent event by name. */
659 agent_event_next_duplicate(event_name, agt, &iter);
660 node = lttng_ht_iter_get_node_str(&iter);
661 } while (node);
662end:
663 rcu_read_unlock();
664 return ret;
665}
f20baf8e 666/*
022d91ba 667 * Disable all agent event for a given UST session.
f20baf8e
DG
668 *
669 * Return LTTNG_OK on success or else a LTTNG_ERR* code.
670 */
fefd409b
DG
671int event_agent_disable_all(struct ltt_ust_session *usess,
672 struct agent *agt)
f20baf8e 673{
0dcfcf94 674 int ret;
fefd409b 675 struct agent_event *aevent;
f20baf8e
DG
676 struct lttng_ht_iter iter;
677
fefd409b 678 assert(agt);
f20baf8e
DG
679 assert(usess);
680
0dcfcf94
DG
681 /*
682 * Disable event on agent application. Continue to disable all other events
683 * if the * event is not found.
684 */
fefd409b 685 ret = event_agent_disable(usess, agt, "*");
0dcfcf94
DG
686 if (ret != LTTNG_OK && ret != LTTNG_ERR_UST_EVENT_NOT_FOUND) {
687 goto error;
f20baf8e
DG
688 }
689
b9866e08 690 /* Disable every event. */
f20baf8e 691 rcu_read_lock();
fefd409b 692 cds_lfht_for_each_entry(agt->events->ht, &iter.iter, aevent,
f20baf8e 693 node.node) {
0dcfcf94
DG
694 if (!aevent->enabled) {
695 continue;
696 }
697
698 ret = event_agent_disable(usess, agt, aevent->name);
699 if (ret != LTTNG_OK) {
b9866e08 700 goto error_unlock;
f20baf8e 701 }
f20baf8e 702 }
f20baf8e
DG
703 ret = LTTNG_OK;
704
b9866e08
JG
705error_unlock:
706 rcu_read_unlock();
f20baf8e
DG
707error:
708 return ret;
709}
This page took 0.078146 seconds and 4 git commands to generate.